Finders Keypers: Open-source AWS KMS key usage finder
24
Mar
2025

Finders Keypers: Open-source AWS KMS key usage finder

Finders Keypers is an open-source tool for analyzing the current usage of AWS KMS keys. It supports both AWS customer…

Chris Hadfield: The sky is falling – what to do about space junk?
24
Mar
2025

Chris Hadfield: The sky is falling – what to do about space junk?

The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing…

Cloud providers aren’t delivering on security promises
24
Mar
2025

Cloud providers aren’t delivering on security promises

Security concerns around cloud environments has prompted 44% of CISOs to change cloud service provider, according to Arctic Wolf. This…

Month in security with Tony Anscombe – December 2024 edition
24
Mar
2025

Month in security with Tony Anscombe – December 2024 edition

From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity…

Gemini
24
Mar
2025

Google Gemini’s Astra (screen sharing) rolls out on Android for some users

At MWC 2025, Google confirmed it was working on screen and video share capabilities for Gemini Live, codenamed “Project Astra”….

AI and quantum computing widen the machine identity security gap
24
Mar
2025

AI and quantum computing widen the machine identity security gap – Partner Content

Unfortunately, gaps in machine identity security may allow attackers to access sensitive data and systems, making an effective cybersecurity strategy…

Gary Marcus – Taming Silicon Valley
24
Mar
2025

Gary Marcus – Taming Silicon Valley

The prominent AI researcher explores the societal impact of artificial intelligence and outlines his vision for a future in which…

Machine identity a key priority for organisations’ security strategies: CyberArk
24
Mar
2025

Machine identity a key priority for organisations’ security strategies: CyberArk – Partner Content

An integrated strategy that combines privileged access management, zero trust principles and AI-powered automation is key to protecting workforce users…

Cameron Camp
24
Mar
2025

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core…

Nine restructures data, technology functions
24
Mar
2025

Nine restructures data, technology functions – Digital Nation – Emerging Tech – Strategy

Nine has restructured its data, product and technology divisions, creating separate units for its consumer and enterprise businesses. Suzie Cardwell,…

State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone
24
Mar
2025

State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone

The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats 07…

Phil Muncaster
24
Mar
2025

Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it’s time for a refresher on how to keep your…